CVE-2014-1530

medium

Description

The docshell implementation in Mozilla Firefox before 29.0, Firefox ESR 24.x before 24.5, Thunderbird before 24.5, and SeaMonkey before 2.26 allows remote attackers to trigger the loading of a URL with a spoofed baseURI property, and conduct cross-site scripting (XSS) attacks, via a crafted web site that performs history navigation.

References

https://security.gentoo.org/glsa/201504-01

https://bugzilla.mozilla.org/show_bug.cgi?id=895557

http://www.ubuntu.com/usn/USN-2189-1

http://www.ubuntu.com/usn/USN-2185-1

http://www.securitytracker.com/id/1030165

http://www.securitytracker.com/id/1030164

http://www.securitytracker.com/id/1030163

http://www.securityfocus.com/bid/67137

http://www.oracle.com/technetwork/topics/security/bulletinapr2016-2952098.html

http://www.mozilla.org/security/announce/2014/mfsa2014-43.html

http://www.debian.org/security/2014/dsa-2924

http://www.debian.org/security/2014/dsa-2918

http://rhn.redhat.com/errata/RHSA-2014-0449.html

http://rhn.redhat.com/errata/RHSA-2014-0448.html

http://lists.opensuse.org/opensuse-updates/2014-05/msg00040.html

http://lists.opensuse.org/opensuse-updates/2014-05/msg00033.html

http://lists.opensuse.org/opensuse-updates/2014-05/msg00013.html

http://lists.opensuse.org/opensuse-updates/2014-05/msg00010.html

http://lists.opensuse.org/opensuse-security-announce/2014-05/msg00015.html

http://lists.opensuse.org/opensuse-security-announce/2014-05/msg00006.html

http://lists.fedoraproject.org/pipermail/package-announce/2014-May/132437.html

http://lists.fedoraproject.org/pipermail/package-announce/2014-May/132332.html

Details

Source: Mitre, NVD

Published: 2014-04-30

Updated: 2020-08-07

Risk Information

CVSS v2

Base Score: 4.3

Vector: CVSS2#AV:N/AC:M/Au:N/C:N/I:P/A:N

Severity: Medium

CVSS v3

Base Score: 6.1

Vector: CVSS:3.0/AV:N/AC:L/PR:N/UI:R/S:C/C:L/I:L/A:N

Severity: Medium